Showing 10,901 - 10,920 results of 28,739 for search '"computing"', query time: 0.09s Refine Results
  1. 10901

    Determination of fracture toughness in plain concrete specimens by R curve by Chbani Hamza, Saadouki Bouchra, Barakat Mohamed

    Published 2019-07-01
    “…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
    Get full text
    Article
  2. 10902

    Attribute-based proxy signature scheme for unmanned aerial vehicle networks by Lei HE, Jianfeng MA, Dawei WEI

    Published 2021-11-01
    “…It is necessary to use digital signature scheme to protect integrity and authentication of commands sent by command agencies to unmanned aerial vehicle (UAV) in the UAV networks.Moreover, the signature scheme should ensure UAV can receive signature in time and protect privacy of signers.Therefore, an attribute-based proxy signature scheme for UAV networks was proposed and its security was analyzed.The proposed signature scheme has existential unforgeability under selective-attribute and chosen message attacks, and privacy of signers is protected.Its efficiency was analyzed in terms of computation costs and communication costs, and compared with other related signature schemes.The results indicate the proposed signature scheme has less computation costs when its communication costs are at the same level with other signature schemes.…”
    Get full text
    Article
  3. 10903

    On Ruijsenaars-Schneider spectrum from superconformal indices and ramified instantons by Hee-Cheol Kim, Anton Nedelin, Shlomo S. Razamat

    Published 2025-02-01
    “…Second approach uses computations of Nekrasov-Shatashvili limit of 5d N $$ \mathcal{N} $$ = 1* instanton partition functions in the presence of co-dimension two defect. …”
    Get full text
    Article
  4. 10904

    RETRACTED: Bone Age Assessment Based on Deep Convolutional Features and Fast Extreme Learning Machine Algorithm by Longjun Guo, Juan Wang, Jiaqi Teng, Yukun Chen

    Published 2022-02-01
    “…However, it also faces the issue of huge computation overhead in deep features learning. Aiming at this problem, this paper proposes a new DL-based bone age assessment method based on the Tanner-Whitehouse method. …”
    Get full text
    Article
  5. 10905

    An Unusual Cause of Spontaneous Pneumomediastinum: The Mounier-Kuhn Syndrome by Salim Naciri, Rachida Zahraoui, Mouna Soualhi, Jamal-Eddine Bourkadi

    Published 2019-01-01
    “…Diagnosis is made by computed tomography and bronchoscopy. An 81-year-old man presenting with an acute chest pain was referred to the pulmonology department. …”
    Get full text
    Article
  6. 10906

    TRAINING STUDENTS IN ARCHITECTURE IN THE DIGITAL AND ARTIFICIAL INTELLIGENCE ERA by Pham Hong Son

    Published 2024-12-01
    “…With the development of science and technology, computers not only support the design of technical drawings but also affect the architectural creation process, especially artificial intelligence technology. …”
    Get full text
    Article
  7. 10907

    The Application of the Homotopy Perturbation Method and the Homotopy Analysis Method to the Generalized Zakharov Equations by Hassan A. Zedan, Eman El Adrous

    Published 2012-01-01
    “…HAM is a strong and easy-to-use analytic tool for nonlinear problems. Computation of the absolute errors between the exact solutions of the GZE equations and the approximate solutions, comparison of the HPM results with those of Adomian’s decomposition method and the HAM results, and computation the absolute errors between the exact solutions of the GZE equations with the HPM solutions and HAM solutions are presented.…”
    Get full text
    Article
  8. 10908

    A Visibility-based Angular Bispectrum Estimator for Radio-interferometric Data by Sukhdeep Singh Gill, Somnath Bharadwaj, Sk. Saiyad Ali, Khandakar Md Asif Elahi

    Published 2025-01-01
    “…Considering radio-interferometric observations, we present a fast and efficient estimator to compute the binned angular bispectrum (ABS) from gridded visibility data. …”
    Get full text
    Article
  9. 10909

    Symbol timing recovery algorithm based on ordered statistic of maximum mean power timing for WBAN by HIYu C, HENLan C, VChao L

    Published 2015-05-01
    “…The symbol timing algorithm based on maximum mean power timing is independent of carrier phase offset,and has the property of capturing timing information fast,which meets the demand of wireless body area networks (WBAN).According to IEEE 802.15.6 standard,the ordered statistic of maximum mean power timing was used to reduce the computational complexity in the symbol timing process.The theoretical analysis and simulation results shows that the proposed algorithm can achieve symbol timing within 32 symbols and reduce the computational complexity by ninety percent at most compared to the original maximum mean power algorithm.The fast synchronization and car-rier-independence property of the proposed algorithm can also make room for carrier-offset recovery and frame synchro-nization.…”
    Get full text
    Article
  10. 10910

    Modal Analysis of In-Wheel Motor-Driven Electric Vehicle Based on Bond Graph Theory by Di Tan, Qiang Wang, Yanshou Wu

    Published 2017-01-01
    “…To verify the effectiveness of the established model, the results were compared to ones computed on the ground of modal analysis and Newton equations. …”
    Get full text
    Article
  11. 10911

    Recognition method of digital modulation signals over non-Gaussian noise in cognitive radio by Ming-qian LIU, Bing-bing LI, Chao-feng CAO, Zhao LI

    Published 2014-01-01
    “…In cognitive radio system,the traditional methods of digital modulation signals recognition with Alpha stable distribution noise have the problems of poor performance and high computation complexity.A novel recognition method based on correlation coefficient of fractional lower order cyclic spectrum was proposed to solve this problem.The method extracts the recognition characteristic parameters which are five correlation coefficients of the fractional lower order cyclic spectrum’s section and frequency spectrum’s section and projection planes of both,and then decision tree was used as a classifier to achieve digital modulation signals recognition.Simulation results show that the proposed method not only has higher recognition rates and better robustness but also has lower computation complexity in an Alpha stable distribution noise environment,which is more suitable for cognitive radio system.…”
    Get full text
    Article
  12. 10912

    Objectifs et stratégies de publication d’un bulletin de liaison : Le Médiéviste et l’Ordinateur (1979-1989) by Edgar Lejeune

    Published 2022-12-01
    “…In 1979, a small group of computer users specialised in medieval history launched a publication of a new type: a newsletter called Le Médiéviste et l’Ordinateur. …”
    Get full text
    Article
  13. 10913

    Low-Complexity Decoding Algorithms for Distributed Space-Time Coded Regenerative Relay Systems by Chao Zhang, Huarui Yin

    Published 2012-09-01
    “…Computational complexities of these three decoders are also analyzed. …”
    Get full text
    Article
  14. 10914

    RFID security authentication scheme based on Montgomery-form elliptic curve cryptography by Wumei ZHANG

    Published 2016-05-01
    “…For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was proposed.This scheme uses the Montgomery elliptic curve to reduce the amount of computation,and to provide mutual authentication between the label and the server,and anonymity and forward security.The analysis showed that the scheme could resist replay attack,tag camouflage attack,server cheat attack,DoS attack,position tracking attack and clone attack.Compared with the existing schemes,the proposed scheme provides high security performance under low memory,computation and communication requirements,and it can meet the security requirements of the RFID system.…”
    Get full text
    Article
  15. 10915

    Distributed locating algorithm for wireless sensor networks-MDS-MAP(D) by MA Zhen, LIU Yun, SHEN Bo

    Published 2008-01-01
    “…A new distributed locating algorithm MDS-MAP(D) was proposed,which attempted to improve the perform-ance of node localization in wireless sensor networks.The process of the computation about node relative coordinates and the aggregation from local network to global network are introduced explicitly.Further,the analyses to computational complexity and the simulations of the algorithm are also present.MDS-MAP(D),which is based on node clustering mechanism and uses connectivity of nodes to estimate the coordinates of nodes,reduces the complexity and energy con-sumption of node localization on the absence of distance measurement with high precision.The simulation and analysis results indicate that the complexity of node localization algorithm falls to O(Nm 2),m < N from O(N 3) and the accu-racy is improved 1%~3%.…”
    Get full text
    Article
  16. 10916

    Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach by Sourav Mondal, Muhammad Imran, Nilanjan De, Anita Pal

    Published 2023-01-01
    “…The algebraic polynomial plays a significant role in mathematical chemistry to compute the exact expressions of distance-based, degree-distance-based, and degree-based topological indices. …”
    Get full text
    Article
  17. 10917

    Intercarrier interference cancellation based on iterative detection algorithm for OFDM systems over time-varying channels by WANG Xia, ZHU Shi-hua

    Published 2006-01-01
    “…In order to effectically cancel the intercarrier interference(ICI) in the OFDM(orthogonal frequency-division multiplexing) systems,a novel iterative detection algorithm was proposed based on parallel interference cancellation.With the principle of maximize the minimum signal-to-interference and noise power ratio,the received signal was proc-essed by decision,reconstruction and ICI cancellation,iterative algorithm based on ICI cancellation was set up,the flow chart on signal detection was given.On the basis of analysis on time-varying channel,the influence of the normalized Doppler frequency offset on the system performance was investigated.Computer simulation results were presented.Simulation results show that the proposed scheme can improve the system performance significantly by using of the time diversity of time varying channel.The computational complexity can be reduced form O(N 3) toO(N).…”
    Get full text
    Article
  18. 10918

    Postsurgical Prosthetic Rehabilitation after Mandibular Ameloblastoma Resection: A 7-Year Follow-Up Case Report by C. Moreno-Soriano, A. Estrugo-Devesa, P. Castañeda-Vega, E. Jané-Salas, J. López-López

    Published 2021-01-01
    “…After placement of 6 dental implants, the patient was rehabilitated with a lower hybrid prosthesis fabricated using computer-aided design-computer-aided manufacturing. …”
    Get full text
    Article
  19. 10919

    Comparison of Mechanical Impedance Methods for Vibration Simulation by Jeffrey A. Gatscher, Grzegorz Kawiecki

    Published 1996-01-01
    “…The establishment of validated computer models, coupled with laboratory impedance measurements, can eliminate the overtesting problems inherent with constant motion, infinite impedance testing strategies.…”
    Get full text
    Article
  20. 10920

    Asymmetrical Blood Flow in the Temporal Lobe in the Charles Bonnet Syndrome: Serial Neuroimaging Study by N. Adachi, M. Nagayama, K. Anami, K. Arima, H. Matsuda

    Published 1994-01-01
    “…She had no deterioration of intelligence. Computed tomography (CT) and magnetic resonance imaging (MRI) showed moderate generalized atrophy, particularly of the temporal lobes. …”
    Get full text
    Article